Infosec on FreeBSD
Tools to install
[X] john
[X] ndiff
[X] nmap
[M] zenmap
[X] nikto
[X] kismet-2008
[M] wistumbler2-gtk
[X] wireshark
[ ] sqlmap
[ ] ettercap-gtk
[ ] traceroute
[ ] traceroute6
[ ] hashcat
[ ] hydra
[ ] burp
[ ] nbtscan
[ ] dillo
[X] zap
[ ] chromium
[ ] sqlitebrowser
ZAP port was installed
You must install Chrome based browser or Firefox based browser for be used in some tasks.
# pkg install chromium firefox geckodriver
ZAP includes linux webdrivers for Chrome and Firefox but these don’t work on FreeBSD.
You must change some paths from Tools/Options/Selenium/Webdrivers:
Chromedriver to /usr/local/bin/chromedriver
Geckodriver to /usr/local/bin/geckodriver
Also, you must change Chrome and Firefox based web browser binary path files:
Chrome binary to /usr/local/bin/chrome
Firefox binary to /usr/local/bin/firefox
If you want to use some python scripts to use ZAP from command line or from another applications, look at the following urls:
https://github.com/zaproxy/zaproxy/blob/main/docker/zap-baseline.py https://github.com/zaproxy/community-scripts/tree/main/other/api/mass-baseline https://github.com/zaproxy/zap-api-python/tree/main/src/examples
These scripts use ZAP Python API. Install it from security/py-zaproxy
Enjoy it
Kismet
Kismet has been installed with a setuid-root capture helper binary, /usr/local/bin/kismet_capture, which may be executed by users in the kismet group. USERS IN THIS GROUP WILL BE ABLE TO ALTER NETWORK INTERFACE STATES, but this is more secure than running all of kismet as root. ONLY users in this group will be able to run kismet and capture from physical network devices.
Wireshark
In order for wireshark be able to capture packets when used by unprivileged user, /dev/bpf should be in network group and have read-write permissions. For example:
# chgrp network /dev/bpf* # chmod g+r /dev/bpf* # chmod g+w /dev/bpf*
In order for this to persist across reboots, add the following to /etc/devfs.conf:
own bpf* root:network perm bpf* 0660